Exam 8: Controlling Information Systems: Introduction to Pervasive Controls
Exam 1: Introduction to Accounting Information Systems115 Questions
Exam 2: Enterprise Systems140 Questions
Exam 3: Electronic Business E-Business Systems113 Questions
Exam 4: Documenting Information Systems108 Questions
Exam 5: Database Management Systems180 Questions
Exam 6: Relational Databases and Sql93 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls157 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls126 Questions
Exam 10: The Order Entrysales Oes Process128 Questions
Exam 11: The Billingaccounts Receivable Cash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process131 Questions
Exam 13: Accounts Payablecash Disbursements Apcd Process104 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes118 Questions
Exam 15: Integrated Production Processes IPP106 Questions
Exam 16: General Ledger and Business Reporting Glbr Process78 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
Within the data center, the data control group is responsible for routing all work into and out of the data center, correcting errors, and monitoring error correction.
(True/False)
4.9/5
(42)
As an IT resource, information includes data in all their forms that are input, processed and output by information systems.
(True/False)
4.9/5
(35)
The ___________________________________logs and monitors who is on or is trying to access the network.
(Short Answer)
4.9/5
(28)
______________________________ is the intentional unauthorized access of an organization's computer system, accomplished by bypassing the system's access security controls.
(Short Answer)
4.8/5
(35)
The ___________________________________ coordinates the organizational and IT strategic planning processes and reviews and approves the strategic IT plan.
(Short Answer)
4.7/5
(38)
Systems documentation provides an overall description of the application, including the system's purpose; an overview of system procedures; and sample source documents, outputs, and reports.
(True/False)
4.8/5
(38)
The system of controls used in this text consists of the control environment, pervasive control plans, IT general controls, and business process (and application) control plans.
(True/False)
4.7/5
(42)
Application controls restrict access to data, programs, and documentation.
(True/False)
4.9/5
(35)
Within the data center, the data librarian function grants access to programs, data, and documentation to authorized personnel only.
(True/False)
4.8/5
(34)
The disaster recovery strategy known as a cold site is a fully equipped data center that is made available to client companies for a monthly subscriber fee.
(True/False)
4.9/5
(37)
Business continuity planning is the process that identifies events that may threaten an organization and provide a framework whereby the organization will continue to operate or resume operations with a minimum of disruption.
(True/False)
4.8/5
(45)
The function composed of people, procedures, and equipment that is typically called the information systems department, IS department, or the IT department is the information systems organization.
(True/False)
4.7/5
(34)
In a logic bomb attack, a Web site is overwhelmed by an intentional onslaught of thousands of simultaneous messages, making it impossible for the attacked site to engage in its normal activities.
(True/False)
4.8/5
(46)
Which of the following statements related to denial of service attacks is false?
(Multiple Choice)
4.9/5
(38)
Continuity is the process of using backup measures to restore lost data and resume operations.
(True/False)
4.9/5
(32)
Program documentation provides a description of an application computer program and usually includes the program's purpose, program flowcharts, and source code listings.
(True/False)
4.7/5
(44)
The ______________________________ maintains custody of and controls access to programs,
files, and documentation.
(Short Answer)
4.9/5
(38)
A warehouse clerk manually completing an order document and forwarding it to purchasing for approval is an example of:
(Multiple Choice)
4.8/5
(37)
Access control software ensures that only authorized users gain access to a system through a process
of identification and authentication.
(True/False)
4.8/5
(38)
The _________________________ describes user procedures for an application and assists the user in preparing inputs and using outputs.
(Short Answer)
4.8/5
(35)
Showing 41 - 60 of 157
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)